Filters








1,169 Hits in 5.4 sec

Zero Footprint Secure Internet Authentication Using Network Smart Card [chapter]

Asad M. Ali
2006 Lecture Notes in Computer Science  
This paper describes the motivation and technological innovation of Network Smart Card, a next generation smart card architecture that supports standard Internet communication and security protocols.  ...  The paper evaluates several common methods of authenticating users as well as servers during online transactions and shows how they can be improved by the use of Network Smart Card.  ...  Zero Footprint Authentication Once the user has been authenticated to Network Smart Card, the smart card can act on user's behalf and securely send his login credentials to remote online servers.  ... 
doi:10.1007/11733447_7 fatcat:kvizrfcpbbhfffkiea6spwn6wu

Secure Network Card [chapter]

Michael Montgomery, Asad Ali, Karen Lu
2004 IFIP International Federation for Information Processing  
This implementation enables a smart card to establish secure TCP/IP connections using SSL/TLS protocols to any client or server on the Internet, using only standard networking protocols, and requiring  ...  A standard (unmodified) client or server anywhere on the network can securely communicate directly with this card; as far as the remote computer can tell, the smart card is just another computer on the  ...  End-to-end security using SSL/TLS security within smart card.  ... 
doi:10.1007/1-4020-8147-2_13 fatcat:chdcosw2cfdpdkzol7dxizcgqq

Experiments in Wireless Internet Security [chapter]

Sumit Gupta, Vipul Gupta
2004 Statistics: A Series of Textbooks and Monographs  
Index Terms-Wireless Internet, Wireless security, SSL, end-toend security, J2ME TM .  ...  However, data security and privacy remain major concerns in the current generation of "wireless web" offerings. All such offerings today use a security architecture that lacks end-to-end security.  ...  Sun, Sun Microsystems, Java, Java Card, J2SE, J2ME and iPlanet are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries.  ... 
doi:10.1201/9781420030884.ch3 fatcat:xu4cqfq6dreznj5v3s5q4q73em

An Approach to Biometric Identity Management Using Low Cost Equipment

Robert Mueller, Raul Sanchez-Reillo
2009 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
Professional implementation relies upon a secure embedded system and two-factor authentication for managing the important credentials.  ...  We designed a system that allows digital identity management using two-factor authentication.  ...  The full template matching process must be executed within a smart card chip. 3) Zero footprint: The user may not always operate on her own equipment, but instead, work in an Internet Café or on a PC  ... 
doi:10.1109/iih-msp.2009.50 dblp:conf/iih-msp/MuellerS09 fatcat:33p5yaybjbcarkbsdqa2ssribi

Securing the wireless internet

V. Gupta, S. Gupta
2001 IEEE Communications Magazine  
However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security.  ...  This article presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices.  ...  Significant performance gains are also obtainable by using hardware accelerators in the form of tiny smart cards (and related devices like the iButton).  ... 
doi:10.1109/35.968814 fatcat:zm3ooi6hbbggxkhjdgmhbzruae

A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking

Bossi Masamila
2013 International journal of network security and its applications  
Public key cryptography is the proven solution that can provide secure transaction at every point of interaction in mobile banking value chain.  ...  This paper proposes a need for peer-to-peer Strong Local Authentication Protocol (p2pSLAP) for Mobile Banking Transaction that implements a peer-to-peer architecture to provide local authentication mechanism  ...  Lightweight cryptography contributes to the security of smart objects networks because of its efficiency and smaller footprint.  ... 
doi:10.5121/ijnsa.2013.5603 fatcat:uapwv4pc3zbencv6x4wq2oryoa

An ECPABE Algorithm and RPLS Protocol for Secured Transmission on IOT based Environment

2019 International journal of recent technology and engineering  
A Secure based smart home automation system in IOT application is built for this study.  ...  Furthermore, the data transmission utilizes the energy using Low power consumption protocol using RPLS and to secure the data a data security scheme ECPABE have been proposed here.  ...  Frikken et al., [8] authentication protocol related to Physical Unclonable Function (PCF) which propose the zero-knowledge proof of knowledge (ZKPK) use of discrete logarithm.  ... 
doi:10.35940/ijrte.c6899.098319 fatcat:ncs3ytclkvbgzapdz5ak4bifvq

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables.  ...  This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks.  ...  The stolen smart card attack and off-line guessing attack disrupt the smart-card-based remote user password authentication schemes, which if a user's smart card is stolen, the attacker can extract the  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices [article]

Muhammad Ali Siddiqi, Christian Doerr, Christos Strydis
2020 arXiv   pre-print
authentication, remote monitoring and system scalability.  ...  We find that IMDfence achieves the above security requirements at a mere less than 7% increase in total IMD energy consumption, and less than 14 ms and 9 kB increase in system delay and memory footprint  ...  The smart card similarly decrypts token C and verifies the received MAC using K RC .  ... 
arXiv:2002.09546v3 fatcat:iitqlosgunhpzh2vl2nwpmv5dm

Appendix [chapter]

2010 Smart Card Handbook  
Access control Access control consists of using equipment and/or services to control the entry and exit of employees or customers to or from secure locations.  ...  GLOSSARY The following pages contain a list of terms typically used in the smart card world. Precise, comprehensive definitions of terms can also be found in the ISO/IEC 7816 family of standards.  ...  Internet smart cards are sometimes called 'network cards' because they can act as independent devices on the Internet.  ... 
doi:10.1002/9780470660911.app1 fatcat:qy7ioz5aofhg7pem45tp42tulu

Strategic Research Agenda for Security and Dependability in RD [chapter]

James J. Clarke, William M. Fitzgerald
2005 ISSE 2005 — Securing Electronic Business Processes  
With the advent of mobility, security is even more important than before. Any existing vul-nerabilities of the wired network can be opened to attack if wireless access is not secure.  ...  However, to be viable in the future, mobility must address the foremost challenge confronting it today ensuring a high level of security to protect the enterprise network and the valuable information it  ...  Internet Infrastructure Security Initiative • How IPv6 integration and deployment will affect the security of a network. • Secure Internet technologies. • Defending Internet protocol code exploits (e.g  ... 
doi:10.1007/978-3-322-85237-3_39 fatcat:6duvzirscfhgfga4xh73wdylsi

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are  ...  With the increase of cloud usage, security issues are proportional to the increase.  ...  An entity's privacy needs to be protected at different stages, i.e., in a device, storage, processing, and communication. (6) Smart Card: Smart card provides an easy to use way of gaining a service.  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe

A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments

Soodamani Ramalingam, Hock Gan, Gregory Epiphaniou, Emilio Mistretta
2020 Sensors  
IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked.  ...  Subsequently, a key agreement based on an asymmetric cryptographic scheme, namely B-SPEKE was used to validate and authenticate the source.  ...  Acknowledgments: Research Assistant, Marcus Lee for development of the security procedures in this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20185252 pmid:32937974 fatcat:6mfmloue75d2fdhbe7c7ihi37e

Secure Authentication and Credential Establishment in Narrowband IoT and 5G

Jesus Sanchez-Gomez, Dan Garcia-Carrillo, Rafael Marin-Perez, Antonio F. Skarmeta
2020 Sensors  
Security is critical in the deployment and maintenance of novel IoT and 5G networks.  ...  Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and  ...  They use an Extensible Authentication Protocol (EAP) for network access and secondary authentication [18] , and AAA infrastructures.  ... 
doi:10.3390/s20030882 pmid:32045992 pmcid:PMC7038755 fatcat:727vjddm2jaqzogy5niqcbs2t4

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

Muhammad Ali Siddiqi, Christian Doerr, Christos Strydis
2020 IEEE Access  
authentication, remote monitoring and system scalability.  ...  We find that IMDfence achieves the above security requirements at a mere less than 7% increase in total IMD energy consumption, and less than 14 ms and 9 kB increase in system delay and memory footprint  ...  The smart card similarly decrypts token C and verifies the received MAC using K RC .  ... 
doi:10.1109/access.2020.3015686 fatcat:5onvozvb6jeo3h5jsc6pskzxym
« Previous Showing results 1 — 15 out of 1,169 results